Client (meet lib) tac_firewall ch_firewall ag_vm. (3) Create ch_firewall. (5) Receive and examine (6) Locate agent (7) Create pipes (8) Activate agent

Size: px
Start display at page:

Download "Client (meet lib) tac_firewall ch_firewall ag_vm. (3) Create ch_firewall. (5) Receive and examine (6) Locate agent (7) Create pipes (8) Activate agent"

Transcription

1 Performance Issues in TACOMA Dag Johansen 1 Nils P. Sudmann 1 Robbert van Renesse 2 1 Department of Computer Science, University oftroms, NORWAY??? 2 Department of Computer Science, Cornell University, Ithaca, NY, USA y Abstract. Mobile code performance depends, in part, on the costs of transferring an agent from one host to another and of initiating execution of that agent on a target host. These costs are reported for TACOMA (Troms and COrnell Moving Agents) v1.3, a UNIX-based system that supports agents. The experiments suggest opportunities for performance enhancements, both by changing the underlying operating system and by changing the architecture of the TACOMA run-time system. 1 Introduction One of the motivations for using mobile code in distributed applications is the potential for improved performance. Moving a program between hosts in a network may be cheaper than moving large amounts of data between those hosts. Of course, the performance improvement will depend on the relative cost of moving and installing code. This paper describes detailed measurements of move and install operations for mobile code that is run using the TACOMA (Troms and COrnell Moving Agents) system 3.InTACOMA, a piece of mobile code is called an agent and is accompanied by state information in a briefcase [JvRS95]. By executing a meet operation, an agent initiates the installation and execution of code at another host. TACOMA v1.3, used in these experiments, is the latest in a series of implementations. The system runs under most avors of UNIX, and it supports agents implemented in C, Perl, Python, Scheme, and Tcl. Other agent systems, like Telescript [Whi94], Agent-Tcl [Gra95] and Messengers [LFB96], have similar architectures to TACOMA. However, in contrast to these other systems, TACOMA does not depend on properties of a specic programming language for preserving the integrity of hosts that execute agents TACOMA relies only on operating systems mechanisms (e.g., address spaces and le system protection) for host integrity.??? This work was supported by NSF (Norway) grant No /41 and 11134/41. y This work was supported by ARPA/ONR grant N14-92-J For more information: URL:

2 2 The Experiment In TACOMA, a meet operation is executed by an initiating agent to cause the execution of a target agent on some specied host. The syntax of the meet is: meet ag@h bc[syncjasync] Execution causes target agent ag at host h to be executed using briefcase bc. A briefcase is a collection of named folders, each containing an uninterpreted sequence of bits. When async is specied, the initiating agent continues executing in parallel with execution of ag otherwise the initiating agent blocks. The experiments of this paper are based on blocking meets with a target agent that has anull body (it simply accepts and returns a briefcase), and varying sized briefcases. Our experiments were conducted using 2 Hewlett-Packard C-16 workstations running HP-UX (version 1.2) executing in single-user mode and with TACOMA's logging and security features disabled. Each workstation was equipped as follows: { 16 MHz (PA-8) CPU. { 128 Mbyte RAM. { 4 Gbyte F/W dierential disk. The workstations were connected by a dedicated 1 Mbit/s Ethernet segment. 3 Implementation and Performance The critical path of meet is depicted in the time-space diagram of Figure 1. There, the leftmost arrow represents the initiating agent the rightmost arrow represents the target agent. The two other arrows correspond to TACOMA system processes that are involved in implementing the meet: tac rewall and ch rewall. Both of these processes run on the host executing the target agent. tac rewall monitors a well-known network port and forks an instance of ch rewall for each incoming meet request. The 13 labeled steps in Figure 1 can be grouped as follows: { Marshalling and sending a briefcase (steps 1-4). { Receipt of briefcase by ch rewall (steps 5-6). { Creation of an execution environment for the meeting (steps 7-1). { Sending a message back to the initiating agent (steps 11-13). Each of these is explained in the subsections that follow. To measure these, we ran 1 meet operations and proled each using calls to gettimeofday(). In some cases, we summarize our experimental results using a sample distribution plot (SDP), which gives the number of samples that fall within each of 1 consecutive time intervals of equal length.

3 Client (meet lib) tac_firewall ch_firewall ag_vm (1) Marshal briefcase (2) TCP connect (4) Transmit briefcase (3) Create ch_firewall (5) Receive and examine (6) Locate agent (7) Create pipes (8) Activate agent (9) Deliver briefcase (12) Return status to client (1)Unmarshal and start agent (11) Return status to ch_firewall (13) Terminate Fig. 1. Event diagram illustrating a meet operation. 3.1 Marshalling and Sending Step 1 - Marshalling a briefcase: In this step, the briefcase is marshaled for transmission. The briefcase contains a collection of strings. For a minimal size briefcase (42 bytes), the median cost measured for this step is 31 microseconds. Figure 2 shows the median cost as a function of the briefcase size (which depends on the size of the strings). Step 2 - TCP connect: In this step, a TCP connection is established with tac rewall. The median cost measured for this step was 597 microseconds, and is independent of the briefcase size. Figure 3a is an SDP for this step. Step 3 - Creating ch rewall: Here there are two sub-steps. a) tac rewall forks to create ch rewall for processing the meet request. (After forking, tac - rewall is ready to receive another meet request.) The median cost measured for the fork was 1678 microseconds. b) An additional 97 microseconds is required for ch rewall for initialization. Figure 3b is an SDP for this entire step. The elapsed time is largely independent of the briefcase size.

4 14 12 Marshal briefcase Sample 95% Confidence Interval Size (Kbytes) Fig. 2. Marshalling cost vs. briefcase size Client connects to the remote fw (TCP/IP) 6 5 Firewall accepts and creates a new process (a) (b) Fig. 3. (a) Cost of connecting to tac rewall (b) Cost of tac rewall forking to create ch rewall. Step 4- Transmitting the briefcase: In this step, the marshaled briefcase is transferred to ch rewall. The median cost for executing the send (for a minimal briefcase) was measured as 57 microseconds this reects only the elapsed time to copy the briefcase into the kernel at the sender. Figure 4 gives SDPs for three dierent briefcase sizes. Notice that step 4 overlaps the execution of step Receipt of the Briefcase Step 5 - Receive and examine: Here there are two sub-steps. a) ch rewall receives the incoming briefcase. The median cost measured for this step was 151 microseconds. The receive (read) itself accounts for a surprising 157 microseconds we are currently attempting to isolate the reasons. b) The remaining

5 Client delivers the archive bc to remote fw Client delivers the archive bc to remote fw Client delivers the archive bc to remote fw (a) k (b) 8k (c) 16k Fig. 4. The cost of shipping a briefcase to the ch rewall Deliver briefcase (TCP/IP) Sample 95% Confidence Interval Size (Kbytes) Fig. 5. The median cost of briefcase transmission varying the size of the briefcase. 3 microseconds are spent checking the message contents for consistency with its header. Step 6 - Locate local TACOMA agent: In this step ch rewall determines the location of the executable for the target agent. This involves issuing a stat() kernel call. The median cost measured for this step was 152 microseconds. 3.3 Building an Execution Environment Step 7 - Create pipes: In this step, ch rewall creates two UNIXpipes for sending the briefcase to the target agent and receiving results. The median cost measured for this operation was 346 microseconds. Step 8 - Activate the TACOMA agent: This step initiates execution of the target agent and consists of two sub-steps. a) A vfork() (59 microseconds) is

6 invoked, followed by an b) execl() (which returns after 2147 microseconds) 5. The median cost measured for this step was 2656 microseconds and is independent of the size of the briefcase. Figure 6 shows the SDP for this step. The samples grouped around 14 miliseconds is probably caused by occasional cache misses and, consequently, accessing the disk. Ch_firewall activates the contact (execl) Time (milisec) Fig. 6. The cost of activating the destination agent. Step 9 - Transfer the briefcase: In this step, ch rewall sends the marshaled briefcase to the target agent using one of the pipes created in step 7. This cost is independent of briefcase size as long as the briefcase is smaller than 8Kb and, therefore, ts in the pipe's kernel buer. However, if the marshaled briefcase is larger than 8Kb, context switches are necessary between ch rewall and the agent. Above 8Kb the overhead grows linearly. For a minimal size briefcase, the median cost measured for this step is 133 microseconds. Figure 7 shows SDPs for three dierent sizes of briefcases, and Figure 8 gives the median cost for additional briefcase sizes. Step 1 - Unmarshal and start agent: Here there are three sub-steps. a) First, completion of the step 8 target agent creation is awaited. If the target agent executable was not in the kernel le cache, the executable mustbeloadedfrom disk. When a cache hit occurs, which was the common case in our experiments, a delay of 8137 microseconds was measured. b) The target agent receives the briefcase sent in step 9 from the pipe created in step 7. This seems to require 2535 microseconds, according to our measurements. 5 Execution of the target agent starts at step 8, and occurs only after the execl() returns.

7 Ch_firewall delivers the archive to the contact Time (milisec) Ch_firewall delivers the archive to the contact Time (milisec) Ch_firewall delivers the archive to the contact 45 4 (a) k (b) 8k (c) 16k Time (milisec) Fig. 7. SDPs of pipe communication cost three dierent briefcase sizes Deliver briefcase (pipe) Sample 95% Confidence Interval Size (Kbytes) Fig. 8. The cost of delivering the marshaled briefcase to the agent. c) The briefcase is unmarshalled and the target agent is invoked. We measured 66 microseconds for this step when there is a small briefcase. Figure 9 shows a graph of this cost as a function of briefcase sizes. The median cost for this entire step is 11,278 microseconds. 3.4 Termination Step 11 - Return status to ch rewall: In this step, the target agent sends a status message through the pipe created in step 7 to ch rewall. The median cost measured for this step was 2374 microseconds, but with a high variance (values ranging from 31 to 2458 microseconds were measured). We cannot account for the high variance and are investigating further. Step 12 - Return status to client: In this step, ch rewall returns the target agent's status message back to the initiating agent. The delay of this step was estimated by measuring the TCP round-trip time and halving it, obtaining 554 microseconds.

8 8 7 Unmarshall and acctivate Sample 95% Confidence Interval Size (Kbytes) Fig. 9. Graph of unmarshalling cost. Step 13 - Terminate: In this step, the TCP connection is closed at both ends. The median cost for this nal operation was measured as 212 microseconds. 3.5 Total Cost By summing the measurements given above, we calculate a median value of 21,675 microseconds (see Table 1). As a point of reference, a Sun RPC for the same data is 5.5 miliseconds. However, for such an RPC, the server's execution environment is static and set up in advance. Table 1. Cost of steps in a meet (in microseconds). Step 1 2 3a 3b (4) 5a 5b 6 7 8a 8b 9 1a 1b 1c Median Discussion This paper gives the delay associated with executing a meet in TACOMA. The delay results from setting up an environment for executing the code that was included by the source host. Our measurements suggest places where contemplating performance improvements is worthwhile. We now turn attention to those. Steps 2, 3, and 7, which account for 2718 microseconds (approximately 12% of the total cost of a meet), can be improved by re-using resources rather than

9 repeatedly allocating and freeing them. By keeping a cache of TCP connections to cached child rewall processes, the delay for steps 2, 3, and 7 is eliminated. Step 9 and the second part of step 1 account for 2668 microseconds (approximately 12% of the total cost of a meet) also can be eliminated by (i) sending the briefcase directly from the initiating agent to the target agent and (ii) sending the status message directly back to the initiating agent. Finally, the vfork() operation in step 8 that ch rewall uses to set up a process can be removed from the critical path, saving another 59 microseconds. A real fork() would then have to be substituted, since now the child of ch rewall will have tolocatetheagent executable, but since it will be out of the critical path this should not add to extra overhead. The high cost of steps 5, 1, and 11 could be reduced if HP-UX provided better performance for transferring data between the kernel and user memory. We are investigating the current source of this poor performance. An higher-level technique for improving performance of meet operations is to copy parts of a briefcase to the remote host on demand (i.e. lazily). Typically not all data in the briefcase will be needed at every host that an agent visits. This can be exploited to speed the activation of a target agent, sending data to that agent only when it is needed. After all, reducing data transfer is the raison d'etre for the mobile agent paradigm. Acknowledgments We would like to thank Fred B. Schneider for many discussions and comments on this paper. References [Gra95] R. S. Gray. Agent Tcl: A transportable agent system. Technical report, Dartmouth College, Hanover, New Hampshire 3755, November [JvRS95] D. Johansen, R. van Renesse, and F. B. Schneider. Operating System Support for Mobile Agents. In Proceedings of the 5th Workshop on Hot Topics in Operating Systems (HOTOS-V), pages 42{45. IEEE Press, May [LFB96] M. B. Dillencourt L. F. Bic, M. Fukuda. Distributed Computing using Autonomous Objects. IEEE Computer, 29(8), August [Whi94] J. E. White. Telescript technology: The foundation for the electronic marketplace. General Magic white paper, General Magic Inc., This article was processed using the LATEX macro package with LLNCS style

Marshal Briefcase Performance. Unmarshal Briefcase Performance. PalmOS Windows CE. PalmOS Windows CE. Time (milliseconds) Time (milliseconds) 80

Marshal Briefcase Performance. Unmarshal Briefcase Performance. PalmOS Windows CE. PalmOS Windows CE. Time (milliseconds) Time (milliseconds) 80 Mobile Software on Mobile Hardware - Experiences with TACOMA on PDAs Kjetil Jacobsen Dag Johansen Department of Computer Science, University of Troms, NORWAY.

More information

ORB Performance: Gross vs. Net

ORB Performance: Gross vs. Net ORB Performance: Gross vs. Net Brad Balfour Objective Interface 1892 Preston White Drive Reston VA 20191-5448 703/295-6500 (voice) 703/295-6501 (fax) http://www.ois.com/ brad.balfour@ois.com Topics! End-to-End

More information

RTI Performance on Shared Memory and Message Passing Architectures

RTI Performance on Shared Memory and Message Passing Architectures RTI Performance on Shared Memory and Message Passing Architectures Steve L. Ferenci Richard Fujimoto, PhD College Of Computing Georgia Institute of Technology Atlanta, GA 3332-28 {ferenci,fujimoto}@cc.gatech.edu

More information

Frank Miller, George Apostolopoulos, and Satish Tripathi. University of Maryland. College Park, MD ffwmiller, georgeap,

Frank Miller, George Apostolopoulos, and Satish Tripathi. University of Maryland. College Park, MD ffwmiller, georgeap, Simple Input/Output Streaming in the Operating System Frank Miller, George Apostolopoulos, and Satish Tripathi Mobile Computing and Multimedia Laboratory Department of Computer Science University of Maryland

More information

An Empirical Study of Reliable Multicast Protocols over Ethernet Connected Networks

An Empirical Study of Reliable Multicast Protocols over Ethernet Connected Networks An Empirical Study of Reliable Multicast Protocols over Ethernet Connected Networks Ryan G. Lane Daniels Scott Xin Yuan Department of Computer Science Florida State University Tallahassee, FL 32306 {ryanlane,sdaniels,xyuan}@cs.fsu.edu

More information

THE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL. Jun Sun, Yasushi Shinjo and Kozo Itano

THE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL. Jun Sun, Yasushi Shinjo and Kozo Itano THE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL Jun Sun, Yasushi Shinjo and Kozo Itano Institute of Information Sciences and Electronics University of Tsukuba Tsukuba,

More information

Technische Universitat Munchen. Institut fur Informatik. D Munchen.

Technische Universitat Munchen. Institut fur Informatik. D Munchen. Developing Applications for Multicomputer Systems on Workstation Clusters Georg Stellner, Arndt Bode, Stefan Lamberts and Thomas Ludwig? Technische Universitat Munchen Institut fur Informatik Lehrstuhl

More information

Random Neural Networks for the Adaptive Control of Packet Networks

Random Neural Networks for the Adaptive Control of Packet Networks Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.

More information

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy ONE: The Ohio Network Emulator Mark Allman, Adam Caldwell, Shawn Ostermann mallman@lerc.nasa.gov, adam@eni.net ostermann@cs.ohiou.edu School of Electrical Engineering and Computer Science Ohio University

More information

6.9. Communicating to the Outside World: Cluster Networking

6.9. Communicating to the Outside World: Cluster Networking 6.9 Communicating to the Outside World: Cluster Networking This online section describes the networking hardware and software used to connect the nodes of cluster together. As there are whole books and

More information

Mobile Computing Models What is the best way to partition a computation as well as the functionality of a system or application between stationary and

Mobile Computing Models What is the best way to partition a computation as well as the functionality of a system or application between stationary and Mobile Computig: Conclusions Evaggelia Pitoura Computer Science Department, University of Ioannina, Ioannina, Greece http://www.cs.uoi.gr/~ pitoura Summer School, Jyvaskyla, August 1998 Mobile Computing

More information

Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination 1. Introduction

Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination 1. Introduction Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination Hans Kruse McClure School of Communication Systems Management Ohio University 9 S. College Street Athens,

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Programming with Network Sockets Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Sockets We ve looked at shared memory vs.

More information

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:

More information

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems Robert Grimm University of Washington Extensions Added to running system Interact through low-latency interfaces Form

More information

Operating System Support

Operating System Support Operating System Support Dr. Xiaobo Zhou Adopted from Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 1 Learning Objectives Know what a modern

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination 1. Introduction

Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination 1. Introduction Performance Of Common Data Communications Protocols Over Long Delay Links An Experimental Examination Hans Kruse McClure School of Communication Systems Management Ohio University 9 S. College Street Athens,

More information

Optimistic Implementation of. Bulk Data Transfer Protocols. John B. Carter. Willy Zwaenepoel. Rice University. Houston, Texas.

Optimistic Implementation of. Bulk Data Transfer Protocols. John B. Carter. Willy Zwaenepoel. Rice University. Houston, Texas. Optimistic Implementation of Bulk Data Transfer Protocols John B. Carter Willy Zwaenepoel Department of Computer Science Rice University Houston, Texas Abstract During a bulk data transfer over a high

More information

The latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication

The latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication The latency of user-to-user, kernel-to-kernel and interrupt-to-interrupt level communication John Markus Bjørndalen, Otto J. Anshus, Brian Vinter, Tore Larsen Department of Computer Science University

More information

Adding Adaptive Flow Control to Swift/RAID

Adding Adaptive Flow Control to Swift/RAID Adding Adaptive Flow Control to Swift/RAID Chane L. Fullmer, Darrell D. E. Long y Computer and Information Sciences University of California, Santa Cruz Luis-Felipe Cabrera Computer Science Department

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Efficient Buffering in Reliable Multicast Protocols

Efficient Buffering in Reliable Multicast Protocols Efficient Buffering in Reliable Multicast Protocols Oznur Ozkasap, Robbert van Renesse, Kenneth P. Birman, Zhen Xiao Dept. of Computer Science, Cornell University 4118 Upson Hall, Ithaca, NY 14853 {ozkasap,rvr,ken,xiao}@cs.cornell.edu

More information

NFS Design Goals. Network File System - NFS

NFS Design Goals. Network File System - NFS Network File System - NFS NFS Design Goals NFS is a distributed file system (DFS) originally implemented by Sun Microsystems. NFS is intended for file sharing in a local network with a rather small number

More information

Exercises TCP/IP Networking With Solutions

Exercises TCP/IP Networking With Solutions Exercises TCP/IP Networking With Solutions Jean-Yves Le Boudec Fall 2009 3 Module 3: Congestion Control Exercise 3.2 1. Assume that a TCP sender, called S, does not implement fast retransmit, but does

More information

Source 1. Destination 1. Bottleneck Link. Destination 2. Source 2. Destination N. Source N

Source 1. Destination 1. Bottleneck Link. Destination 2. Source 2. Destination N. Source N WORST CASE BUFFER REQUIREMENTS FOR TCP OVER ABR a B. Vandalore, S. Kalyanaraman b, R. Jain, R. Goyal, S. Fahmy Dept. of Computer and Information Science, The Ohio State University, 2015 Neil Ave, Columbus,

More information

A Mobile Agent-Based Framework for Active Networks. Ichiro Satoh

A Mobile Agent-Based Framework for Active Networks. Ichiro Satoh A Mobile -Based Framework for Active Networks Ichiro Satoh Department of Information Sciences, Ochanomizu University 2-1-1 Otsuka Bunkyo-ku Tokyo 112-8610, Japan E-mail: ichiro@is.ocha.ac.jp IEEE Systems,

More information

Intro to LAN/WAN. Transport Layer

Intro to LAN/WAN. Transport Layer Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface

More information

TECHNICAL NOTE. Oracle Protocol Agent Overview. Version 2.5 TECN04_SG2.5_

TECHNICAL NOTE. Oracle Protocol Agent Overview. Version 2.5 TECN04_SG2.5_ Version 2.5 TECHNICAL NOTE Oracle Protocol Agent Overview Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: info@stonesoft.com Copyright

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [THREADS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Shuffle less/shuffle better Which actions?

More information

Performance of DB2 Enterprise-Extended Edition on NT with Virtual Interface Architecture

Performance of DB2 Enterprise-Extended Edition on NT with Virtual Interface Architecture Performance of DB2 Enterprise-Extended Edition on NT with Virtual Interface Architecture Sivakumar Harinath 1, Robert L. Grossman 1, K. Bernhard Schiefer 2, Xun Xue 2, and Sadique Syed 2 1 Laboratory of

More information

Utilizing Linux Kernel Components in K42 K42 Team modified October 2001

Utilizing Linux Kernel Components in K42 K42 Team modified October 2001 K42 Team modified October 2001 This paper discusses how K42 uses Linux-kernel components to support a wide range of hardware, a full-featured TCP/IP stack and Linux file-systems. An examination of the

More information

TKQML: A Scripting Tool for Building Agents

TKQML: A Scripting Tool for Building Agents TKQML: A Scripting Tool for Building Agents R. Scott Cost, Ian Soboroff, Jeegar Lakhani, Tim Finin, Ethan Miller, and Charles Nicholas Computer Science and Electrical Engineering University of Maryland

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2008

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2008 Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2008 9:30-11:10 Tuesday November 11, 2008 Prohibited 1. You are not allowed to write down the

More information

UDP: Datagram Transport Service

UDP: Datagram Transport Service UDP: Datagram Transport Service 1 Topics Covered Introduction Transport Protocols and End-to-End Communication The User Datagram Protocol The Connectionless Paradigm Message-Oriented Interface UDP Communication

More information

As related works, OMG's CORBA (Common Object Request Broker Architecture)[2] has been developed for long years. CORBA was intended to realize interope

As related works, OMG's CORBA (Common Object Request Broker Architecture)[2] has been developed for long years. CORBA was intended to realize interope HORB: Distributed Execution of Java Programs HIRANO Satoshi Electrotechnical Laboratory and RingServer Project 1-1-4 Umezono Tsukuba, 305 Japan hirano@etl.go.jp http://ring.etl.go.jp/openlab/horb/ Abstract.

More information

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract 1 of 9 6/18/2006 7:41 PM Kernel Korner Analysis of the HTB Queuing Discipline Yaron Benita Abstract Can Linux do Quality of Service in a way that both offers high throughput and does not exceed the defined

More information

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets. Team Project 1 Due: Beijing 00:01, Friday Nov 7 Language: English Turn-in (via email) a.pdf file. Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and

More information

Lightweight Remote Procedure Call

Lightweight Remote Procedure Call Lightweight Remote Procedure Call Brian N. Bershad, Thomas E. Anderson, Edward D. Lazowska, Henry M. Levy ACM Transactions Vol. 8, No. 1, February 1990, pp. 37-55 presented by Ian Dees for PSU CS533, Jonathan

More information

TAG Word 0 Word 1 Word 2 Word 3 0x0A0 D2 55 C7 C8 0x0A0 FC FA AC C7 0x0A0 A5 A6 FF 00

TAG Word 0 Word 1 Word 2 Word 3 0x0A0 D2 55 C7 C8 0x0A0 FC FA AC C7 0x0A0 A5 A6 FF 00 ELE 758 Final Examination 2000: Answers and solutions Number of hits = 15 Miss rate = 25 % Miss rate = [5 (misses) / 20 (total memory references)]* 100% = 25% Show the final content of cache using the

More information

UNIVERSITY OF OSLO. Faculty of mathematics and natural sciences. INF3190/INF4190 Data Communications. All printed and written material, calculator

UNIVERSITY OF OSLO. Faculty of mathematics and natural sciences. INF3190/INF4190 Data Communications. All printed and written material, calculator UNIVERSITY OF OSLO Faculty of mathematics and natural sciences Examination in Day of examination: 2nd June, 2004 Examination hours: 9.00 12.00 This problem set consists of 6 pages. Appendices: Permitted

More information

AN O/S PERSPECTIVE ON NETWORKS Adem Efe Gencer 1. October 4 th, Department of Computer Science, Cornell University

AN O/S PERSPECTIVE ON NETWORKS Adem Efe Gencer 1. October 4 th, Department of Computer Science, Cornell University AN O/S PERSPECTIVE ON NETWORKS Adem Efe Gencer 1 October 4 th, 2012 1 Department of Computer Science, Cornell University Papers 2 Active Messages: A Mechanism for Integrated Communication and Control,

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

External Data Representation (XDR)

External Data Representation (XDR) External Data Representation (XDR) Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN NTUT, TAIWAN 1 Introduction This chapter examines

More information

Programming Project. Remember the Titans

Programming Project. Remember the Titans Programming Project Remember the Titans Due: Data and reports due 12/10 & 12/11 (code due 12/7) In the paper Measured Capacity of an Ethernet: Myths and Reality, David Boggs, Jeff Mogul and Chris Kent

More information

Networking Performance for Microkernels. Chris Maeda. Carnegie Mellon University. Pittsburgh, PA March 17, 1992

Networking Performance for Microkernels. Chris Maeda. Carnegie Mellon University. Pittsburgh, PA March 17, 1992 Networking Performance for Microkernels Chris Maeda Brian N. Bershad School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 March 17, 1992 Abstract Performance measurements of network

More information

A Simulation: Improving Throughput and Reducing PCI Bus Traffic by. Caching Server Requests using a Network Processor with Memory

A Simulation: Improving Throughput and Reducing PCI Bus Traffic by. Caching Server Requests using a Network Processor with Memory Shawn Koch Mark Doughty ELEC 525 4/23/02 A Simulation: Improving Throughput and Reducing PCI Bus Traffic by Caching Server Requests using a Network Processor with Memory 1 Motivation and Concept The goal

More information

Chapter 4: Threads. Chapter 4: Threads. Overview Multicore Programming Multithreading Models Thread Libraries Implicit Threading Threading Issues

Chapter 4: Threads. Chapter 4: Threads. Overview Multicore Programming Multithreading Models Thread Libraries Implicit Threading Threading Issues Chapter 4: Threads Silberschatz, Galvin and Gagne 2013 Chapter 4: Threads Overview Multicore Programming Multithreading Models Thread Libraries Implicit Threading Threading Issues 4.2 Silberschatz, Galvin

More information

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

c) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window. Part 1 Question 1 [0.5 Marks] Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated by a TCP segment and then an IP datagram. What percentage of each

More information

Process Management. Processes. Processes. Processes, Threads, and Agents. A distributed system is a collection of cooperating processes.

Process Management. Processes. Processes. Processes, Threads, and Agents. A distributed system is a collection of cooperating processes. Process Management A distributed system is a collection of cooperating es. Applications, services Middleware Processes, Threads, and Agents OS: kernel, libraries & servers OS1 Processes, threads, communication,...

More information

A trace-driven analysis of disk working set sizes

A trace-driven analysis of disk working set sizes A trace-driven analysis of disk working set sizes Chris Ruemmler and John Wilkes Operating Systems Research Department Hewlett-Packard Laboratories, Palo Alto, CA HPL OSR 93 23, 5 April 993 Keywords: UNIX,

More information

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK [r.tasker@dl.ac.uk] DataTAG is a project sponsored by the European Commission - EU Grant IST-2001-32459

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Reliable File Transfer

Reliable File Transfer Due date Wednesday, Mar 14, 11:59pm Reliable File Transfer CS 5565 Spring 2012, Project 2 This project is worth 100 points. You may form teams of up to two students for this project. You are not required

More information

The Client Server Model and Software Design

The Client Server Model and Software Design The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction

More information

Version 8 Base SAS Performance: How Does It Stack-Up? Robert Ray, SAS Institute Inc, Cary, NC

Version 8 Base SAS Performance: How Does It Stack-Up? Robert Ray, SAS Institute Inc, Cary, NC Paper 9-25 Version 8 Base SAS Performance: How Does It Stack-Up? Robert Ray, SAS Institute Inc, Cary, NC ABSTRACT This paper presents the results of a study conducted at SAS Institute Inc to compare the

More information

Securing Grid Data Transfer Services with Active Network Portals

Securing Grid Data Transfer Services with Active Network Portals Securing Grid Data Transfer Services with Active Network Portals Onur Demir 1 2 Kanad Ghose 3 Madhusudhan Govindaraju 4 Department of Computer Science Binghamton University (SUNY) {onur 1, mike 2, ghose

More information

NET-COMPUTER: Internet Computer Architecture Based on Intelligent Agents

NET-COMPUTER: Internet Computer Architecture Based on Intelligent Agents NET-COMPUTER: Internet Computer Architecture Based on Intelligent s Odhiambo Marcel O Department of Electrical and Mining Engineering, University of South Africa (UNISA), P.O. Box 392, UNISA - 0003, South

More information

More on Address Translation. CS170 Fall T. Yang Some of slides from UCB CS162 by Kubiatowicz

More on Address Translation. CS170 Fall T. Yang Some of slides from UCB CS162 by Kubiatowicz More on Address Translation CS170 Fall 2018. T. Yang Some of slides from UCB CS162 by Kubiatowicz Topics Review of last lecture on pagetable based address translation One-level page table Muti-level paging

More information

Java Virtual Machine

Java Virtual Machine Evaluation of Java Thread Performance on Two Dierent Multithreaded Kernels Yan Gu B. S. Lee Wentong Cai School of Applied Science Nanyang Technological University Singapore 639798 guyan@cais.ntu.edu.sg,

More information

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT Hardware Assisted Recursive Packet Classification Module for IPv6 etworks Shivvasangari Subramani [shivva1@umbc.edu] Department of Computer Science and Electrical Engineering University of Maryland Baltimore

More information

Chapter 8: Virtual Memory. Operating System Concepts

Chapter 8: Virtual Memory. Operating System Concepts Chapter 8: Virtual Memory Silberschatz, Galvin and Gagne 2009 Chapter 8: Virtual Memory Background Demand Paging Copy-on-Write Page Replacement Allocation of Frames Thrashing Memory-Mapped Files Allocating

More information

Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents

Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents Ichiro Satoh National Institute of Informatics / Japan Science and Technology Corporation 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo

More information

Performance analysis, development and improvement of programs, commands and BASH scripts in GNU/Linux systems

Performance analysis, development and improvement of programs, commands and BASH scripts in GNU/Linux systems Performance analysis, development and improvement of programs, commands and BASH scripts in GNU/Linux systems Erion ÇANO Prof. Dr Betim ÇIÇO 11 TH W O R K S H O P S O F T W A R E E N G I N E E R I N G

More information

Design and Evaluation of a Socket Emulator for Publish/Subscribe Networks

Design and Evaluation of a Socket Emulator for Publish/Subscribe Networks PUBLISHED IN: PROCEEDINGS OF THE FUTURE INTERNET SYMPOSIUM 2010 1 Design and Evaluation of a for Publish/Subscribe Networks George Xylomenos, Blerim Cici Mobile Multimedia Laboratory & Department of Informatics

More information

COT 4600 Operating Systems Fall Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM

COT 4600 Operating Systems Fall Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM COT 4600 Operating Systems Fall 2009 Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM Lecture 23 Attention: project phase 4 due Tuesday November 24 Final exam Thursday December 10 4-6:50

More information

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA TCP over Wireless Networks Using Multiple Acknowledgements (Preliminary Version) Saad Biaz Miten Mehta Steve West Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

More information

CIS Operating Systems File Systems. Professor Qiang Zeng Fall 2017

CIS Operating Systems File Systems. Professor Qiang Zeng Fall 2017 CIS 5512 - Operating Systems File Systems Professor Qiang Zeng Fall 2017 Previous class I/O subsystem: hardware aspect Terms: controller, bus, port Addressing: port-mapped IO and memory-mapped IO I/O subsystem:

More information

Process. Program Vs. process. During execution, the process may be in one of the following states

Process. Program Vs. process. During execution, the process may be in one of the following states What is a process? What is process scheduling? What are the common operations on processes? How to conduct process-level communication? How to conduct client-server communication? Process is a program

More information

DISTRIBUTED FILE SYSTEMS & NFS

DISTRIBUTED FILE SYSTEMS & NFS DISTRIBUTED FILE SYSTEMS & NFS Dr. Yingwu Zhu File Service Types in Client/Server File service a specification of what the file system offers to clients File server The implementation of a file service

More information

Applications, services. Middleware. OS2 Processes, threads, Processes, threads, communication,... communication,... Platform

Applications, services. Middleware. OS2 Processes, threads, Processes, threads, communication,... communication,... Platform Operating System Support Introduction Distributed systems act as resource managers for the underlying hardware, allowing users access to memory, storage, CPUs, peripheral devices, and the network Much

More information

Measuring the Processing Performance of NetSniff

Measuring the Processing Performance of NetSniff Measuring the Processing Performance of NetSniff Julie-Anne Bussiere *, Jason But Centre for Advanced Internet Architectures. Technical Report 050823A Swinburne University of Technology Melbourne, Australia

More information

Multicast can be implemented here

Multicast can be implemented here MPI Collective Operations over IP Multicast? Hsiang Ann Chen, Yvette O. Carrasco, and Amy W. Apon Computer Science and Computer Engineering University of Arkansas Fayetteville, Arkansas, U.S.A fhachen,yochoa,aapong@comp.uark.edu

More information

Ethan Kao CS 6410 Oct. 18 th 2011

Ethan Kao CS 6410 Oct. 18 th 2011 Ethan Kao CS 6410 Oct. 18 th 2011 Active Messages: A Mechanism for Integrated Communication and Control, Thorsten von Eicken, David E. Culler, Seth Copen Goldstein, and Klaus Erik Schauser. In Proceedings

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

Systemwalker Service Quality Coordinator. Technical Guide. Windows/Solaris/Linux

Systemwalker Service Quality Coordinator. Technical Guide. Windows/Solaris/Linux Systemwalker Service Quality Coordinator Technical Guide Windows/Solaris/Linux J2X1-6800-02ENZ0(00) November 2010 Preface Purpose of this manual This manual explains the functions and usage of Systemwalker

More information

Performance Sentry VM Provider Objects April 11, 2012

Performance Sentry VM Provider Objects April 11, 2012 Introduction This document describes the Performance Sentry VM (Sentry VM) Provider performance data objects defined using the VMware performance groups and counters. This version of Performance Sentry

More information

The Peregrine High-performance RPC System

The Peregrine High-performance RPC System SOFIWARE-PRACTICE AND EXPERIENCE, VOL. 23(2), 201-221 (FEBRUARY 1993) The Peregrine High-performance RPC System DAVID B. JOHNSON* AND WILLY ZWAENEPOEL Department of Computer Science, Rice University, P.

More information

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2012

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2012 Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2012 9:30-11:10 Thursday November 8, 2012 Prohibited 1. You are not allowed to write down the

More information

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006 Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2006 9:20-11:00 Tuesday November 14, 2006 Prohibited 1. You are not allowed to write down the

More information

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol Transport Layer Transport Layer The transport layer is responsible for the delivery of a message from one process to another Types of Data Deliveries Client/Server Paradigm An application program on the

More information

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks 1 Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy Department of Computer and Information Science The Ohio State University

More information

Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation

Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 891-904 (2002) Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation Department of Information Systems

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Mininet Performance Fidelity Benchmarks

Mininet Performance Fidelity Benchmarks Mininet Performance Fidelity Benchmarks Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, Bob Lantz, Nick McKeown October 21, 2012 1 Introduction This initial Mininet technical report evaluates the

More information

Applications PVM (Parallel Virtual Machine) Socket Interface. Unix Domain LLC/SNAP HIPPI-LE/FP/PH. HIPPI Networks

Applications PVM (Parallel Virtual Machine) Socket Interface. Unix Domain LLC/SNAP HIPPI-LE/FP/PH. HIPPI Networks Enhanced PVM Communications over a HIPPI Local Area Network Jenwei Hsieh, David H.C. Du, Norman J. Troullier 1 Distributed Multimedia Research Center 2 and Computer Science Department, University of Minnesota

More information

Objectives. Chapter 10. Upon completion you will be able to:

Objectives. Chapter 10. Upon completion you will be able to: Chapter 10 Figure 10.1 Position of IGMP in the network layer Objectives Upon completion you will be able to: Know the purpose of IGMP Know the types of IGMP messages Understand how a member joins a group

More information

Chapter 8 Virtual Memory

Chapter 8 Virtual Memory Operating Systems: Internals and Design Principles Chapter 8 Virtual Memory Seventh Edition William Stallings Modified by Rana Forsati for CSE 410 Outline Principle of locality Paging - Effect of page

More information

A Comparison of Two Distributed Systems: Amoeba & Sprite. By: Fred Douglis, John K. Ousterhout, M. Frans Kaashock, Andrew Tanenbaum Dec.

A Comparison of Two Distributed Systems: Amoeba & Sprite. By: Fred Douglis, John K. Ousterhout, M. Frans Kaashock, Andrew Tanenbaum Dec. A Comparison of Two Distributed Systems: Amoeba & Sprite By: Fred Douglis, John K. Ousterhout, M. Frans Kaashock, Andrew Tanenbaum Dec. 1991 Introduction shift from time-sharing to multiple processors

More information

Multimedia Streaming. Mike Zink

Multimedia Streaming. Mike Zink Multimedia Streaming Mike Zink Technical Challenges Servers (and proxy caches) storage continuous media streams, e.g.: 4000 movies * 90 minutes * 10 Mbps (DVD) = 27.0 TB 15 Mbps = 40.5 TB 36 Mbps (BluRay)=

More information

Communication in Distributed Systems

Communication in Distributed Systems Communication in Distributed Systems Sape J. Mullender Huygens Systems Research Laboratory Universiteit Twente Enschede 1 Introduction Functions of Communication Transport data between processes, machines,

More information

An Architecture for Next Generation Mobile Agent Infrastructure

An Architecture for Next Generation Mobile Agent Infrastructure An Architecture for Next Generation Mobile Agent Infrastructure Ichiro Satoh Department of Information Sciences, Ochanomizu University / Japan Science and Technology Corporation Abstract This paper presents

More information

Performing Basic System Management

Performing Basic System Management This module describes the basic tasks that you can perform to manage the general system features of the Cisco IOS software--those features that are generally not specific to a particular protocol. Finding

More information

Data Block. Data Block. Copy A B C D P HDD 0 HDD 1 HDD 2 HDD 3 HDD 4 HDD 0 HDD 1

Data Block. Data Block. Copy A B C D P HDD 0 HDD 1 HDD 2 HDD 3 HDD 4 HDD 0 HDD 1 RAID Network RAID File System 1) Takashi MATSUMOTO 1) ( 101-8430 2{1{2 E-mail:tmatsu@nii.ac.jp) ABSTRACT. The NRFS is a brand-new kernel-level subsystem for a low-cost distributed le system with fault-tolerant

More information

Chapter 4 Communication

Chapter 4 Communication DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 4 Communication Layered Protocols (1) Figure 4-1. Layers, interfaces, and protocols in the OSI

More information

I/O CHARACTERIZATION AND ATTRIBUTE CACHE DATA FOR ELEVEN MEASURED WORKLOADS

I/O CHARACTERIZATION AND ATTRIBUTE CACHE DATA FOR ELEVEN MEASURED WORKLOADS I/O CHARACTERIZATION AND ATTRIBUTE CACHE DATA FOR ELEVEN MEASURED WORKLOADS Kathy J. Richardson Technical Report No. CSL-TR-94-66 Dec 1994 Supported by NASA under NAG2-248 and Digital Western Research

More information